Debian Libyang vulnerabilities
17 known vulnerabilities affecting debian/libyang.
Total CVEs
17
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH9MEDIUM6
Vulnerabilities
Page 1 of 1
CVE-2023-26917HIGHCVSS 7.5fixed in libyang 3.4.2+dfsg-2 (forky)2023
CVE-2023-26917 [HIGH] CVE-2023-26917: libyang - libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL pointer derefe...
libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL pointer dereference via the function lysp_stmt_validate_value at lys_parse_mem.c.
Scope: local
bullseye: open
forky: resolved (fixed in 3.4.2+dfsg-2)
sid: resolved (fixed in 3.4.2+dfsg-2)
trixie: resolved (fixed in 3.4.2+dfsg-2)
debian
CVE-2023-26916MEDIUMCVSS 5.3fixed in libyang 3.4.2+dfsg-2 (forky)2023
CVE-2023-26916 [MEDIUM] CVE-2023-26916: libyang - libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL pointer derefe...
libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL pointer dereference via the function lys_parse_mem at lys_parse_mem.c.
Scope: local
bullseye: open
forky: resolved (fixed in 3.4.2+dfsg-2)
sid: resolved (fixed in 3.4.2+dfsg-2)
trixie: resolved (fixed in 3.4.2+dfsg-2)
debian
CVE-2021-28905HIGHCVSS 7.5fixed in libyang 3.4.2+dfsg-2 (forky)2021
CVE-2021-28905 [HIGH] CVE-2021-28905: libyang - In function lys_node_free() in libyang <= v1.0.225, it asserts that the value of...
In function lys_node_free() in libyang module can't be NULL. But in some cases, node->module can be null, which triggers a reachable assertion (CWE-617).
Scope: local
bullseye: open
forky: resolved (fixed in 3.4.2+dfsg-2)
sid: resolved (fixed in 3.4.2+dfsg-2)
trixie: resolved (fixed in 3.4.2+dfsg-2)
debian
CVE-2021-28902HIGHCVSS 7.5fixed in libyang 3.4.2+dfsg-2 (forky)2021
CVE-2021-28902 [HIGH] CVE-2021-28902: libyang - In function read_yin_container() in libyang <= v1.0.225, it doesn't check whethe...
In function read_yin_container() in libyang ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash.
Scope: local
bullseye: open
forky: resolved (fixed in 3.4.2+dfsg-2)
sid: resolved (fixed in 3.4.2+dfsg-2)
trixie: resolved (fixed in 3.4.2+dfsg-2)
debian
CVE-2021-28906HIGHCVSS 7.5fixed in libyang 3.4.2+dfsg-2 (forky)2021
CVE-2021-28906 [HIGH] CVE-2021-28906: libyang - In function read_yin_leaf() in libyang <= v1.0.225, it doesn't check whether the...
In function read_yin_leaf() in libyang ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash.
Scope: local
bullseye: open
forky: resolved (fixed in 3.4.2+dfsg-2)
sid: resolved (fixed in 3.4.2+dfsg-2)
trixie: resolved (fixed in 3.4.2+dfsg-2)
debian
CVE-2021-28904HIGHCVSS 7.5fixed in libyang 3.4.2+dfsg-2 (forky)2021
CVE-2021-28904 [HIGH] CVE-2021-28904: libyang - In function ext_get_plugin() in libyang <= v1.0.225, it doesn't check whether th...
In function ext_get_plugin() in libyang <= v1.0.225, it doesn't check whether the value of revision is NULL. If revision is NULL, the operation of strcmp(revision, ext_plugins[u].revision) will lead to a crash.
Scope: local
bullseye: open
forky: resolved (fixed in 3.4.2+dfsg-2)
sid: resolved (fixed in 3.4.2+dfsg-2)
trixie: resolved (fixed in 3.4.2+dfsg-2)
debian
CVE-2021-28903HIGHCVSS 7.5fixed in libyang 3.4.2+dfsg-2 (forky)2021
CVE-2021-28903 [HIGH] CVE-2021-28903: libyang - A stack overflow in libyang <= v1.0.225 can cause a denial of service through fu...
A stack overflow in libyang <= v1.0.225 can cause a denial of service through function lyxml_parse_mem(). lyxml_parse_elem() function will be called recursively, which will consume stack space and lead to crash.
Scope: local
bullseye: open
forky: resolved (fixed in 3.4.2+dfsg-2)
sid: resolved (fixed in 3.4.2+dfsg-2)
trixie: resolved (fixed in 3.4.2+dfsg-2)
debian
CVE-2019-19334CRITICALCVSS 9.8fixed in libyang 0.16.105-2 (bullseye)2019
CVE-2019-19334 [CRITICAL] CVE-2019-19334: libyang - In all versions of libyang before 1.0-r5, a stack-based buffer overflow was disc...
In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type "identityref". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or possibly gain code execution.
Scope: local
bulls
debian
CVE-2019-19333CRITICALCVSS 9.8fixed in libyang 0.16.105-2 (bullseye)2019
CVE-2019-19333 [CRITICAL] CVE-2019-19333: libyang - In all versions of libyang before 1.0-r5, a stack-based buffer overflow was disc...
In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type "bits". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or possibly gain code execution.
Scope: local
bullseye: re
debian
CVE-2019-20394HIGHCVSS 8.8fixed in libyang 1.0.176-1 (bullseye)2019
CVE-2019-20394 [HIGH] CVE-2019-20394: libyang - A double-free is present in libyang before v1.0-r3 in the function yyparse() whe...
A double-free is present in libyang before v1.0-r3 in the function yyparse() when a type statement in used in a notification statement. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution.
Scope: local
bullseye: resolved (fixed in 1.0.176-1)
forky: resolved (fixed i
debian
CVE-2019-20397HIGHCVSS 8.8fixed in libyang 1.0.176-1 (bullseye)2019
CVE-2019-20397 [HIGH] CVE-2019-20397: libyang - A double-free is present in libyang before v1.0-r1 in the function yyparse() whe...
A double-free is present in libyang before v1.0-r1 in the function yyparse() when an organization field is not terminated. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution.
Scope: local
bullseye: resolved (fixed in 1.0.176-1)
forky: resolved (fixed in 1.0.176-1)
debian
CVE-2019-20393HIGHCVSS 8.8fixed in libyang 1.0.176-1 (bullseye)2019
CVE-2019-20393 [HIGH] CVE-2019-20393: libyang - A double-free is present in libyang before v1.0-r1 in the function yyparse() whe...
A double-free is present in libyang before v1.0-r1 in the function yyparse() when an empty description is used. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution.
Scope: local
bullseye: resolved (fixed in 1.0.176-1)
forky: resolved (fixed in 1.0.176-1)
sid: resolv
debian
CVE-2019-20395MEDIUMCVSS 6.5fixed in libyang 1.0.176-1 (bullseye)2019
CVE-2019-20395 [MEDIUM] CVE-2019-20395: libyang - A stack consumption issue is present in libyang before v1.0-r1 due to the self-r...
A stack consumption issue is present in libyang before v1.0-r1 due to the self-referential union type containing leafrefs. Applications that use libyang to parse untrusted input yang files may crash.
Scope: local
bullseye: resolved (fixed in 1.0.176-1)
forky: resolved (fixed in 1.0.176-1)
sid: resolved (fixed in 1.0.176-1)
trixie: resolved (fixed in 1.0.176-1)
debian
CVE-2019-20398MEDIUMCVSS 6.5fixed in libyang 1.0.176-1 (bullseye)2019
CVE-2019-20398 [MEDIUM] CVE-2019-20398: libyang - A NULL pointer dereference is present in libyang before v1.0-r3 in the function ...
A NULL pointer dereference is present in libyang before v1.0-r3 in the function lys_extension_instances_free() due to a copy of unresolved extensions in lys_restr_dup(). Applications that use libyang to parse untrusted input yang files may crash.
Scope: local
bullseye: resolved (fixed in 1.0.176-1)
forky: resolved (fixed in 1.0.176-1)
sid: resolved (fixed in 1.0.1
debian
CVE-2019-20392MEDIUMCVSS 6.5fixed in libyang 1.0.176-1 (bullseye)2019
CVE-2019-20392 [MEDIUM] CVE-2019-20392: libyang - An invalid memory access flaw is present in libyang before v1.0-r1 in the functi...
An invalid memory access flaw is present in libyang before v1.0-r1 in the function resolve_feature_value() when an if-feature statement is used inside a list key node, and the feature used is not defined. Applications that use libyang to parse untrusted input yang files may crash.
Scope: local
bullseye: resolved (fixed in 1.0.176-1)
forky: resolved (fixed in 1.0.1
debian
CVE-2019-20391MEDIUMCVSS 6.5fixed in libyang 1.0.176-1 (bullseye)2019
CVE-2019-20391 [MEDIUM] CVE-2019-20391: libyang - An invalid memory access flaw is present in libyang before v1.0-r3 in the functi...
An invalid memory access flaw is present in libyang before v1.0-r3 in the function resolve_feature_value() when an if-feature statement is used inside a bit. Applications that use libyang to parse untrusted input yang files may crash.
Scope: local
bullseye: resolved (fixed in 1.0.176-1)
forky: resolved (fixed in 1.0.176-1)
sid: resolved (fixed in 1.0.176-1)
trixie
debian
CVE-2019-20396MEDIUMCVSS 6.5fixed in libyang 1.0.176-1 (bullseye)2019
CVE-2019-20396 [MEDIUM] CVE-2019-20396: libyang - A segmentation fault is present in yyparse in libyang before v1.0-r1 due to a ma...
A segmentation fault is present in yyparse in libyang before v1.0-r1 due to a malformed pattern statement value during lys_parse_path parsing.
Scope: local
bullseye: resolved (fixed in 1.0.176-1)
forky: resolved (fixed in 1.0.176-1)
sid: resolved (fixed in 1.0.176-1)
trixie: resolved (fixed in 1.0.176-1)
debian